Bug 1572240 - Part 4: Stop minting new URIs and principals in ContentBlockingAllowList._basePrincipalForAntiTrackingCommon; r=baku

Differential Revision: https://phabricator.services.mozilla.com/D42205

--HG--
extra : moz-landing-system : lando
This commit is contained in:
Ehsan Akhgari 2019-08-19 14:38:38 +00:00
Родитель 575c480fc5
Коммит 68aa0ff3f4
1 изменённых файлов: 4 добавлений и 20 удалений

Просмотреть файл

@ -43,29 +43,13 @@ const ContentBlockingAllowList = {
}
},
_baseURIForAntiTrackingCommon(browser) {
// Convert document URI into the format used by
// AntiTrackingCommon::IsOnContentBlockingAllowList.
// Any scheme turned into https is correct.
try {
return Services.io.newURI("https://" + browser.currentURI.hostPort);
} catch (e) {
// Getting the hostPort for about: and file: URIs fails, but TP doesn't work with
// these URIs anyway, so just return null here.
return null;
}
},
_basePrincipalForAntiTrackingCommon(browser) {
let baseURI = this._baseURIForAntiTrackingCommon(browser);
if (!baseURI) {
let principal = browser.contentBlockingAllowListPrincipal;
// We can only use content principals for this purpose.
if (!principal || !principal.isContentPrincipal) {
return null;
}
let attrs = browser.contentPrincipal.originAttributes;
return Services.scriptSecurityManager.createContentPrincipal(
baseURI,
attrs
);
return principal;
},
_permissionTypeFor(browser) {